Date: Tue, 25 Nov 2008 12:39:00 +0100 From: Jan Lieskovsky <jlieskov@...hat.com> To: "Steven M. Christey" <coley@...re.org> Cc: Eygene Ryabinkin <rea-sec@...elabs.ru>, Michael Sweet <mike@...ysw.com>, oss-security@...ts.openwall.com Subject: Re: CVE request: cups - potential integer overflow in PNG image reader [was: CUPS DoS via RSS subscriptions] Hello Steve and Eygene, On Fri, 2008-11-21 at 07:23 -0800, Michael Sweet wrote: > Eygene Ryabinkin wrote: > > Steve, good day. > > > > Thu, Nov 20, 2008 at 07:41:06PM -0500, Steven M. Christey wrote: > >> I treated this as two CVEs, one for the CSRF-simplifying attack, and a > >> separate one for the CUPS server crash (assuming that cupsd should not be > >> crashable by non-root authenticated users). > > > > Please note that as it was discuissed in thread started with > > http://www.openwall.com/lists/oss-security/2008/11/19/4 > > even 1.3.9 is crashable by non-root authenticated users by adding > > a big number of subscriptions (don't know about RSS ones, though > > subscription for mailing upon job completion does its job). But > > I imagine that CVE-2008-5184 can't be used for 1.3.9, so remote > > attack is not feasible. > > > > I expect that the fix will go into 1.3.10: > > http://svn.easysw.com/public/cups/trunk/CHANGES-1.3.txt > > Eygene - Thanks for the post! Btw. this CHANGES-1.3.txt files also mentions another security flaw, i.e incomplete fix for CVE-2008-1722: <cite> - SECURITY: The PNG image reading code did not validate the image size properly, leading to a potential buffer overflow (STR #2974) </cite> The relevant upstream cups BTS post together with patch attached is here: Advisory: http://www.cups.org/str.php?L2974 Patch: http://www.cups.org/strfiles/2974/str2974.patch This issue seems to be introduced by the fix for CVE-2008-1722, i.e: Advisory: http://www.cups.org/str.php?L2790 Patch: http://www.cups.org/strfiles/2790/str2790.patch Steve, could you please allocate a new CVE identifier for this one? Thanks, Jan. -- Jan iankko Lieskovsky / Red Hat Security Response Team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.